[USN-7225-1] HTMLDOC vulnerabilities

Bruce Cable bruce.cable at canonical.com
Thu Jan 23 22:17:37 UTC 2025


==========================================================================
Ubuntu Security Notice USN-7225-1
January 22, 2025

HTMLDOC vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in htmldoc.

Software Description:
- htmldoc: HTML processor that generates indexed HTML, PS, and PDF

Details:

It was discovered that HTMLDOC incorrectly handled memory in the
image_set_mask, git_read_lzw, write_header and write_node functions, which
could lead to a heap buffer overflow. An attacker could possibly use this
issue to cause a denial of service or execute arbitrary code. This issue
only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS and
Ubuntu 20.04 LTS. (CVE-2022-0137, CVE-2022-24191, CVE-2022-34033,
CVE-2022-34035)

It was discovered that HTMLDOC incorrectly handled memory in the
gif_get_code function, which could lead to a segmentation fault. If a
user or application were tricked into opening a crafted GIF file, an
attacker could possibly use this issue to cause a denial of service.
This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS,
Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2022-0534)

It was discovered that HTMLDOC did not perform proper bounds checks on
image dimensions when loading JPEG images, which could lead to a buffer
overflow. If a user or application were tricked into opening a crafted
JPEG image, an attacker could possibly use this issue to cause a denial
of service. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS,
Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-27114)

It was discovered that HTMLDOC incorrectly handled memory in the
pdf_write_names function, which could lead to a heap buffer overflow. If
a user or application were tricked into opening a specially crafted file,
an attacker could possibly use this issue to cause a denial of service or
leak sensitive information. This issue only affected Ubuntu 14.04 LTS,
Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.
(CVE-2022-28085)

It was discovered that HTMLDOC could be made to write out of bounds when
attempting to strip whitespace. An attacker could use this issue to cause
a denial of service or execute arbitrary code. (CVE-2024-45508)

It was discovered that HTMLDOC incorrectly handled memory in the parse_pre
function, which could lead to a heap buffer overflow. If a user or
application were tricked into opening a specially crafted file, an attacker
could possibly use this issue to cause a denial of service or execute
arbitrary code. (CVE-2024-46478)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.10
   htmldoc                         1.9.18-1ubuntu0.1

Ubuntu 24.04 LTS
   htmldoc                         1.9.17-1ubuntu0.1~esm1
                                   Available with Ubuntu Pro

Ubuntu 22.04 LTS
   htmldoc                         1.9.15-1ubuntu0.1~esm1
                                   Available with Ubuntu Pro

Ubuntu 20.04 LTS
   htmldoc                         1.9.7-1ubuntu0.3+esm2
                                   Available with Ubuntu Pro

Ubuntu 18.04 LTS
   htmldoc                         1.9.2-1ubuntu0.2+esm2
                                   Available with Ubuntu Pro

Ubuntu 16.04 LTS
   htmldoc                         1.8.27-8ubuntu1.1+esm3
                                   Available with Ubuntu Pro

Ubuntu 14.04 LTS
   htmldoc                         1.8.27-8ubuntu1+esm4
                                   Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7225-1
   CVE-2022-0137, CVE-2022-0534, CVE-2022-24191, CVE-2022-27114,
   CVE-2022-28085, CVE-2022-34033, CVE-2022-34035, CVE-2024-45508,
   CVE-2024-46478

Package Information:
https://launchpad.net/ubuntu/+source/htmldoc/1.9.18-1ubuntu0.1

-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature.asc
Type: application/pgp-signature
Size: 665 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20250124/d486ce35/attachment.sig>


More information about the ubuntu-security-announce mailing list